A portion of the outer door of AT&T’s Folsom Street facility. [Source: Wired News]Senior AT&T technician Mark Klein (see July 7, 2009), newly assigned to the company’s Folsom Street facility in San Francisco, is tasked to work at the seventh floor “Internet room,” where AT&T manages much of its domestic Internet traffic. Klein is intensely curious about the National Security Agency’s “secret room” on the sixth floor (see January 2003). The NSA room has two doors, both labeled “641A,” and is in reality what Klein will later term “a room within a room,” with the outer room filled with ordinary “computer equipment for mundane corporate uses.” He does not know what is in the inner “secret” room. Klein will later write, “While working in the outer room, you could walk around three sides of the secret room, which I measured to be about 24 by 48 feet.” An outer door leads from Room 641A to the 4ESS switchroom, which AT&T uses to manage its long-distance telephone communications. The rooms are connected by “row after row of equipment and a tangle of cabling going up and across the ceiling.” Klein learns that the NSA room is sometimes called “the SIMS room,” an acronym of which no one seems to know the meaning. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 32-34] Klein will later describe his job at the Folsom Street facility as working with the phone switch equipment on the sixth floor, “which handled the public’s telephone calls and was the workhorse of the phone system.… My main assignment was to oversee the Internet room, and that meant keeping it going. If there were any trouble calls, I had to answer them. If there’s any upgrading work to do, I had to either do it or arrange for others to do it in off hours. Just oversee the flow of work in the Internet room and watch things.” He also spends a tremendous amount of time on the seventh floor, “where the Internet room was.… That’s where there are a lot of Cisco routers, a lot of fiber-optic lines coming in and going out.” The Folsom Street facility serves the Bay Area as well as much of Western America. According to Klein: “There’s lots of Internet traffic, as you can imagine, that goes in and out of this office, probably hundreds of fiber-optic lines that go out, carrying billions—that’s billions with a ‘B’—billions of bits of data going in and out every second every day. So all the Web surfing you’re doing, whatever you’re doing on the Internet—the pictures, the video, the Voice over Internet—all that stuff’s going in and out of there. And then of course there’s also the traditional phone switch, which is doing what it’s been doing since before the Internet.… Handling millions and millions of phone calls, right. That’s its job.” [PBS Frontline, 5/15/2007]

Senior AT&T technician Mark Klein (see July 7, 2009), who is considering “blowing the whistle” on the National Security Agency’s secret data-mining operation being conducted with the complicity and participation of AT&T (see January 16, 2004), is troubleshooting a problem of “signal loss” caused by AT&T’s signals being routed through the NSA’s “splitter cabinet,” which “splits” part of the optical data flow from its normal route into the NSA’s computers, enabling the agency to monitor all of the Internet traffic going through Klein’s Folsom Street, San Francisco, facility (see October 2003). Klein learns from a fellow technician that AT&T is “getting the same problem in the other offices where splitters are going in.” Klein is stunned to learn that other AT&T facilities have NSA splitters. He learns from the other technician that the “other offices” are in, among other places, Atlanta, San Diego, San Jose, and Seattle. (Apparently neither Klein nor the other technician are aware of the NSA splitter at the central AT&T facility in Bridgeton, Missouri—see Late 2002-Early 2003). Klein will later write, “This thing was getting bigger and bigger.” Klein determines that the NSA splitter is causing the signal loss: “The company was degrading the signal quality of its network for the sake of the NSA.” Visiting the Secret Room - Klein accompanies an AT&T field support specialist named Rick into the NSA’s “secret room” at the Folsom Street building, with the intention of repairing the splitter problem. Rick is one of the few AT&T technicians authorized to work in the room; he invites Klein to join him and Klein agrees. Klein watches Rick punch the entry code into the lock of Room 641A and follows him inside. Klein observes a large amount of hardware, most installed in what he will later call “standard cabinets used by the telecommunications industry,” along with a computer workstation and a set of storage lockers. Klein later says he spends no more than two minutes inside the secret room. He will recall: “[I]f I didn’t know that the NSA was involved, it would look like any other work space where telecom people work, with rows of cabinets with equipment inside them, humming.… [T]he odd thing about the whole room, of course, was that I couldn’t normally get in there, nor could any of the other union technicians. Only this one guy who had clearance from the NSA could get in there, so that changed the whole context of what this is about.” Shortly thereafter, Rick tells Klein and a group of employees that he has keys allowing him access to the other NSA secret rooms in AT&T’s offices in San Diego, San Jose, and Seattle. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 42-44]

A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.” Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.” Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write. A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Senior AT&T technician Mark Klein (see July 7, 2009) accepts a buyout package from his firm and retires. Klein, disheartened by the illegal AT&T/NSA wiretapping operation he has documented (see January 16, 2004), decides to keep the documents he has collected over the years (see Fall 2003 and Late 2003), the “hard proof” of the operation, he will later write, “in case there was some change in the political winds that would enable me to come forward and expose… the crimes which I knew were being committed.” [Klein, 2009, pp. 44]

Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.” Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.” Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]

AT&T issues a set of demands to whistleblower and former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). AT&T claims Klein’s documentation, which he procured while working for the company, is “confidential and proprietory” information which he should never have publicly disclosed (see Late March - April 4, 2006 and April 6, 2006). The documentation, AT&T claims, is “extremely sensitive in nature and could be used to compromise the integrity of AT&T’s network.” The firm demands the return of the original documents and all copies, and tells Klein to “refrain from discussing or otherwise disclosing your sealed declaration,” referring to the declaration he has made for the lawsuit (see February 23-28, 2006). AT&T sends similar demands to the EFF, and makes a court filing requesting that EFF turn over its documents to the firm. In response, Klein’s lawyers, Miles Ehrlich and Ismail “Izzy” Ramsey (see Early February 2006), decide that they need the assistance of an experienced civil lawyer, and retain James Brosnahan, the veteran trial lawyer who once represented “American Taliban” John Walker Lindh (see December 3-5, 2001). Klein, with the approval of his lawyers, sends a letter to the EFF explaining that AT&T’s threats and demands are “intended to dazzle ignorant people who know nothing about technical matters.” In his letter, he accuses AT&T of either being genuinely ignorant or “feign[ing] ignorance” about the content of his technical documents. The technical documents he possesses, he says, are not confidential nor proprietory, nor are they related to AT&T’s telephone services, as the firm has claimed. Nothing in the documents could be used to compromise the integrity of AT&T’s networks. Klein says that the addition of the splitters to eavesdrop upon and copy over the electronic communications of American citizens (see Late 2003 and March 29, 2006) has already “compromised the integrity of AT&T’s network.” Klein goes on to note that AT&T does not deny colluding with the government to spy on Americans’ communications, instead it says that the documents Klein possesses do not clearly prove that collusion. In conclusion, Klein writes, AT&T is using specious claims of “trade secrets” infringement and false assertions about the nature and content of Klein’s documents to challenge their acceptability in court. Klein meets with his lawyers to discuss their response to the AT&T demands, and after the lawyers warn him of the possible ramifications of fighting such a large corporation and the government at once, Klein insists he wants to press forward. Brosnahan tells Klein, “My grandfather would be proud of me for taking this on,” and promises, “Don’t worry, Mark, we won’t let you hang out there to dry.” Klein later writes that Bresnahan “was as good as his word.” After Brosnahan meets with the AT&T lawyers on April 10, the firm will withdraw its demands against Klein and EFF. Klein will later write: “[I]f they sued me we would get the right of discovery in court, and that was the last thing they wanted. They only wanted to get out of court.” [New York Times, 4/12/2006; Wired News, 4/12/2006; Klein, 2009, pp. 67-70]

The New York Times does a more in-depth report on the allegations advanced by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The Times published a far briefer report five days earlier (see April 7, 2006). The article provides a brief synopsis of Klein’s allegations—that AT&T worked with the National Security Agency (NSA) to illegally monitor and record millions of Americans’ telephone and Internet communications and thus illegally invaded its customers’ privacy. It also notes, as did the first article, that Klein had provided some of his documentation “to reporters,” though neither article admits that the Times received the documents months beforehand (see Mid-February - Late March, 2006). The new information in the article is the conclusion of “four independent telecommunications and computer security experts” who examined Klein’s documents “at the request of The New York Times.” According to the four experts, the documents “describe equipment capable of monitoring a large quantity of email messages, Internet phone calls, and other Internet traffic. The equipment… was able to select messages that could be identified by keywords, Internet or email addresses, or country of origin and divert copies to another location for further analysis.” All four experts agreed that the documents proved “AT&T had an agreement with the federal government to systematically gather information flowing on the Internet through the company’s network. The gathering of such information, known as data mining, involves the use of sophisticated computer programs to detect patterns or glean useful intelligence from masses of information.” Brian Reid, the director of engineering at the Internet Systems Consortium, says of the AT&T/NSA project: “This took expert planning and hundreds of millions of dollars to build. This is the correct way to do high volume Internet snooping.” An expert who refuses to be named says the documents are “consistent” with Bush administration claims that the NSA only monitored foreign communications and communications between foreign and US locations, in part because of the location of the monitoring sites. (An expert witness, former AT&T and FCC employee J. Scott Marcus, has given testimony for EFF that flatly contradicts this expert’s assertions—see March 29, 2006). The article notes the Justice Department’s objections to Klein’s documents being filed with the court in the EFF lawsuit, and notes that the department withdrew its objections (see Late March - April 4, 2006). It also notes AT&T’s request for the court to order the EFF to return the documents because they are, the firm claimed, “proprietary” (see April 6-8, 2006). AT&T spokesman Walt Sharp says of Klein and the EFF lawsuit: “AT&T does follow all laws with respect to assistance offered to government agencies. However, we are not in a position to comment on matters of national security.” NSA spokesman Don Weber makes a similar statement: “It would be irresponsible of us to discuss actual or alleged operational issues as it would give those wishing to do harm to the United States the ability to adjust and potentially inflict harm.” [New York Times, 4/12/2006] Klein will write of the story, “Finally it was out there in a major newspaper, though I noticed that the New York Times did not show any images of the actual documents, and never called me back for an in-depth followup story.” [Klein, 2009, pp. 71]

In a follow-up hearing, Judge Vaughn Walker of the US District Court of Northern California hears arguments by AT&T and the Justice Department as to whether he should dismiss a lawsuit against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006). The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government asserts that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006). In today’s hearing, Justice Department lawyer Peter Keisler admits to Walker that the documents presented on behalf of the EFF by AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) and others are not classified. “None of the documents they (EFF) have submitted… implicate any privileged [classified] matters,” Keisler tells Walker. The judge says, “Including the Klein documents.” Keisler agrees, saying: “We have not asserted any privilege over the information that is in the Klein and Marcus (see March 29, 2006) documents.… Mr. Klein and Marcus never had access to any of the relevant classified information here, and with all respect to them, through no fault or failure of their own, they don’t know anything.” Klein will later write that Keisler’s admission is a crippling blow to the government’s assertion that the EFF documentation would compromise national security if made public or submitted in open court. [Klein, 2009, pp. 77]

The Electronic Frontier Foundation (EFF) publishes a set of three non-classified documents secured from telecommunications giant AT&T by former AT&T technician and current whistleblower Mark Klein. Klein has used the documents to prove his assertions that AT&T colluded with the National Security Agency to illegally eavesdrop on Americans’ telephone and Internet communications (see December 15-31, 2005 and July 7, 2009). The EFF has sued AT&T for violating its customers’ privacy, and Klein and the documents are key elements of its case (see February 23-28, 2006). After years of opposing their public disclosure and attempting to force their return (see April 6-8, 2006), AT&T acquiesced to the documents’ disclosure earlier this week after the EFF threatened to take the corporation to a federal appeals court. The documents were released in part by Wired News over a year ago against AT&T’s wishes (see May 17, 2006), and PBS also made them public as a part of a Frontline documentary. The Justice Department considered classifying the documents, then rejected the idea (see Late March - April 4, 2006). According to EFF’s Cindy Cohn, AT&T agreed to the disclosure of those portions to escape the embarrassment of arguing that documents available on the Internet for more than a year were secret. Wired’s Ryan Singel writes: “There are no surprises in the AT&T documentation… which consist of a subset of the pages already published by Wired News. They include AT&T wiring diagrams, equipment lists, and task orders that appear to show the company tapping into fiber-optic cables at the point where its backbone network connects to other ISPs at a San Francisco switching office. The documents appear to show the company siphoning off the traffic to a room packed with Internet-monitoring gear.” The EFF also releases a formerly sealed, signed declaration by Klein (see February 23-28, 2006) and a written analysis of the documentation by Internet expert J. Scott Marcus (see March 29, 2006). Marcus’s analysis, which had previously remained largely under court-ordered seal, is “the most interesting” of the releases, Singel writes. Marcus said the AT&T technical configuration allowed the NSA to conduct “surveillance and analysis of Internet content on a massive scale, including both overseas and purely domestic traffic,” and found it probable that AT&T had “15 or 20” secret facilities around the country, not just the few facilities of which Klein was aware. AT&T, with the Justice Department, is trying to prevent EFF’s lawsuit from continuing, insisting that such a trial would expose “state secrets” (see April 28, 2006 and May 13, 2006). Judge Vaughn Walker has already considered and dismissed that claim (see July 20, 2006); AT&T and the government hope an appeals court will find in their favor. Cohn tells Singel she hopes the documents will show the public that their case is based in fact and not speculation, and that the government’s claim of a national security risk is overblown: “It really paints them into a corner, how unreasonable their claims of state secrets are. I’m hoping [the document release] demonstrates we are right and know what we are talking about and that we don’t need much more to win our case. We are much closer than people think.” [Wired News, 6/13/2007]

The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’ [Source: BookSurge / aLibris (.com)]Former AT&T technician Mark Klein self-publishes his book, Wiring Up the Big Brother Machine… and Fighting It. In his acknowledgements, Klein writes that he chose to self-publish (through BookSurge, a pay-to-publish venue) because “[t]he big publishers never called me,” and the single small publishing house that offered to publish his book added “an unacceptable requirement to cut core material.” Klein based his book on his experiences as an AT&T engineer at the telecom giant’s San Francisco facility, where he primarily worked with AT&T’s Internet service. In 2002 and 2003, Klein witnessed the construction of of a “secret room,” a facility within the facility that was used by the National Security Agency (NSA) to gather billions of email, telephone, VoIP (voice over Internet Protocol), and text messages, most of which were sent by ordinary Americans. The NSA did its electronic surveillance, Klein writes, secretly and without court warrants. Klein describes himself as “wiring up the Big Brother machine,” and was so concerned about the potential illegality and constitutional violations of the NSA’s actions (with AT&T’s active complicity) that he retained a number of non-classified documents proving the extent of the communications “vacuuming” being done. Klein later used those documents to warn a number of reporters, Congressional members, and judges of what he considered a horrific breach of Americans’ right to privacy. [Klein, 2009, pp. 9-11, 21-24, 33, 35, 38, 40] In 2007, Klein described his job with the firm as “basically to keep the systems going. I worked at AT&T for 22 and a half years. My job was basically to keep the systems going. They were computer systems, network communication systems, Internet equipment, Voice over Internet [Protocol (VoIP)] equipment. I tested circuits long distance across the country. That was my job: to keep the network up.” He explained why he chose to become a “whistleblower:” “Because I remember the last time this happened.… I did my share of anti-war marches when that was an active thing back in the ‘60s, and I remember the violations and traffic transgressions that the government pulled back then for a war that turned out to be wrong, and a lot of innocent people got killed over it. And I’m seeing all this happening again, only worse. When the [NSA] got caught in the ‘70s doing domestic spying, it was a big scandal, and that’s why Congress passed the FISA [Foreign Intelligence Surveillance Act] law, as you know, to supposedly take care of that (see 1978). So I remember all that. And the only way any law is worth anything is if there’s a memory so that people can say: ‘Wait a minute. This happened before.’ And you’ve got to step forward and say: ‘I remember this. This is the same bad thing happening again, and there should be a halt to it.’ And I’m a little bit of that institutional memory in the country; that’s all.” [PBS Frontline, 5/15/2007]

Ordering

Time period

Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.Contact Us